You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: DA updates:<br>- existing_resource_group has been renamed to use_existing_resource_group<br>- kms_region input has been removed, its not porgrammtically determined<br>- existing_kms_guid has been renamed to existing_kms_instance_crn and now required CRN value to be passed (#101)
# More info about this file at https://github.com/terraform-ibm-modules/common-pipeline-assets/blob/main/.github/workflows/terraform-test-pipeline.md#cra-config-yaml
2
2
version: "v1"
3
3
CRA_TARGETS:
4
-
- CRA_TARGET: "examples/fscloud"# Target directory for CRA scan. If not provided, the CRA Scan will not be run.
4
+
- CRA_TARGET: "solutions/standard"# Target directory for CRA scan. If not provided, the CRA Scan will not be run.
5
5
CRA_IGNORE_RULES_FILE: "cra-tf-validate-ignore-rules.json"# CRA Ignore file to use. If not provided, it checks the repo root directory for `cra-tf-validate-ignore-rules.json`
6
6
PROFILE_ID: "bfacb71d-4b84-41ac-9825-e8a3a3eb7405"# SCC profile ID (currently set to IBM Cloud Framework for Financial Services 1.6.0 profile).
7
7
# SCC_INSTANCE_ID: "" # The SCC instance ID to use to download profile for CRA scan. If not provided, a default global value will be used.
8
8
# SCC_REGION: "" # The IBM Cloud region that the SCC instance is in. If not provided, a default global value will be used.
9
9
CRA_ENVIRONMENT_VARIABLES: # An optional map of environment variables for CRA, where the key is the variable name and value is the value. Useful for providing TF_VARs.
Copy file name to clipboardExpand all lines: solutions/standard/variables.tf
+4-10Lines changed: 4 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ variable "ibmcloud_api_key" {
8
8
sensitive=true
9
9
}
10
10
11
-
variable"existing_resource_group" {
11
+
variable"use_existing_resource_group" {
12
12
type=bool
13
13
description="Whether to use an existing resource group."
14
14
default=false
@@ -85,7 +85,7 @@ variable "iam_engine_name" {
85
85
86
86
variable"skip_kms_iam_authorization_policy" {
87
87
type=bool
88
-
description="Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the existing_kms_instance_guid variable."
88
+
description="Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the existing_kms_instance_crn variable."
description="The region in which KMS instance exists. Only required if not supplying an existing KMS root key CRN."
106
-
}
107
-
108
-
variable"existing_kms_guid" {
102
+
variable"existing_kms_instance_crn" {
109
103
type=string
110
104
default=null
111
-
description="The GUID of of the KMS instance used for the Secrets Manager root Key. Only required if not supplying an existing KMS root key CRN and if 'skip_kms_iam_authorization_policy' is true."
105
+
description="The CRN of the existed Hyper Protect Crypto Services or Key Protect instance. Only required if not supplying an existing KMS key to use for Secrets Manager."
0 commit comments